Essays about: "Permissions"
Showing result 1 - 5 of 57 essays containing the word Permissions.
-
1. Android Malware Detection Using Machine Learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE
-
2. Reactor Chemistry in LWR SMRs : Determination of the rate constant for the reaction between boric acid and hydroxyl radicals
University essay from KTH/Tillämpad fysikalisk kemiAbstract : Ett problem vid byggandet av nya kärnkraftverk för elproduktion är de stora investeringskostnaderna samt den långa tiden det att få tillstånd för en reaktor och bygga den. Nyligen färdigställdes den tredje reaktorn vid Olkiluoto I Finland, den tog 18 år att färdigställa exklusive tiden att få tillstånd för reaktorn. READ MORE
-
3. Workflow-driven, dynamic authorization for Modular Automation systems
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE
-
4. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE
-
5. Implementing and Investigating Partial Consent for Privacy Management of Android
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Data privacy and security has been a big concern in recent years. Data privacy is a concern for everybody who owns a smartphone or accesses a website. This is due to the applications that have been installed on the device or the cookies that have been acquired via websites in the form of advertising cookies. READ MORE